Thank you for joining companies and industry peers for the premier Information Security event in Los Angeles. The Eighth Annual Information Security Summit offered comprehensive, cutting-edge educational sessions presented by a world-class line up of keynote and featured presenters.

Attendees were able to choose from a variety of talks on the latest hot topics, including security governance, application security, security awareness, and risk management.

Thank you to our sponsors!

We hope those of you that attended one of the three special all-day Forums took away some great knowledge.

HealthCare Privacy and Security Forum

Executive Forum – A Gathering of Business Executives and Law Enforcement

CISO Forum – For CISOs and Top Level Security Professionals

We hope you were able to save big when you signed up with one of our package plans which included both the Summit on May 20th and one of our fantastic discounted Training classes on Thursday May 19th!

We hope you enjoyed Summit 8

Your Summit registration included:

May 19: Ira Winkler’s session, “Applying Threat Intelligence to Improve Security Awareness Programs” and our Opening Reception at the Saddle Ranch Chop House on the famous City Walk
May 20th: Breakfast, Breaks, Lunch and Post-Summit Reception

********************

Training Classes

We hope you took advantage of an amazing full day of training classes Thursday, May 19th, 2016.

Application Security for Managers

Enterprise Threat Intelligence Workshop

Information Security Management Boot Camp for IT Professionals

Real World Red Team Attacks

********************

Keynote Speakers

Jack Daniel, Leading Technology Community Activist

Jack Daniel works for Tenable Network Security, has over 20 years’ experience in network and system administration and security, and has worked in a variety of practitioner and management positions.
A technology community activist, he supports several information security and technology organizations. Jack is a co-founder of Security BSides, serves on the boards of three Security BSides non-profit corporations, and helps organize Security B-Sides events.
Jack is a frequent speaker at technology and security events. An early member of the information security community on Twitter, @jack_daniel is an active and vocal Twitter user. Jack is a CISSP, holds CCSK, and is a Microsoft MVP for Enterprise Security.Cory Doctorow, Sci-Fi Novelist, Blogger and Technology Activist

Cory Doctorow (craphound.com) is a science fiction novelist, blogger and technology activist. He is the co-editor of the popular weblog Boing Boing (boingboing.net), and a contributor to The Guardian, Publishers Weekly, Wired, and many other newspapers, magazines and websites. He is a special consultant to the Electronic Frontier Foundation (eff.org), a non-profit civil liberties group that defends freedom in technology law, policy, standards and treaties. He holds an honorary doctorate in computer science from the Open University (UK), where he is a Visiting Professor; in 2007, he served as the Fulbright Chair at the Annenberg Center for Public Diplomacy at the University of Southern California.

World-Class Speakers include:

Ira Winkler, President of Secure Mentem and Co-host of The Irari Report

Mark Weatherford, SVP, Chief Cybersecurity Strategist at vArmour, former DHS First Deputy Under Secretary for Cybersecurity, and the former first CISO of California

Andrea Hoy, ISSA International President and CEO of A. Hoy & Associates

Special Announcement!

Gary Fagan, Chief Deputy District Attorney for San Bernadino will be joining a Privacy vs. Security panel with lawyers from the ACLU and EFF, and moderated by ISSA-LA President Richard Greenberg, to discuss the Apple-FBI controversy. You will not want to miss this!

We have a special CTF Competition for you to test a variety of skills:

]]>http://www.issala.org/eighth-annual-information-security-summit/feed/0SummitSlide5http://www.issala.org/summitslide5/
http://www.issala.org/summitslide5/#respondThu, 05 Apr 2012 01:48:15 +0000http://www.issala.org/?p=1610The ISSA Summit provides business leaders with a concentrated, thought-provoking, and valuable education in the nature of these threats, and how organizations can and should mitigate their risks from today’s cyber threats. I highly recommend that executives take advantage of this annual event.

]]>The ISSA Summit provides business leaders with a concentrated, thought-provoking, and valuable education in the nature of these threats, and how organizations can and should mitigate their risks from today’s cyber threats. I highly recommend that executives take advantage of this annual event.

]]>http://www.issala.org/summitslide5/feed/0SummitSlide4http://www.issala.org/summitslide4/
http://www.issala.org/summitslide4/#respondThu, 05 Apr 2012 01:25:16 +0000http://www.issala.org/?p=1604I recommend the Summit to both the CIO and their staff because it’s the one day you can count on to get informed, learn how to stay informed, and build a network of strong security professionals who are passionate about supporting the “neighborhood watch” of information security. ~ Jennifer Terrill, CISSP

]]>I recommend the Summit to both the CIO and their staff because it’s the one day you can count on to get informed, learn how to stay informed, and build a network of strong security professionals who are passionate about supporting the “neighborhood watch” of information security. ~ Jennifer Terrill, CISSP

]]>http://www.issala.org/summitslide3/feed/0SummitSlide2http://www.issala.org/summitslide2/
http://www.issala.org/summitslide2/#respondTue, 27 Mar 2012 19:03:48 +0000http://www.issala.org/?p=1436The Summit will build on our chapter’s tradition of being the only educational forum in Los Angeles specifically designed to encourage participation and interaction among three vital information security constituencies.

]]>The Summit will build on our chapter’s tradition of being the only educational forum in Los Angeles specifically designed to encourage participation and interaction among three vital information security constituencies.

]]>http://www.issala.org/summitslide2/feed/0SummitSlide1http://www.issala.org/summitslide1/
http://www.issala.org/summitslide1/#respondTue, 27 Mar 2012 19:02:04 +0000http://www.issala.org/?p=1434Never before has it been so important for our community to learn about the dangers of cybercrime and how to protect their organizations from loss.

]]>http://www.issala.org/summit-speaker-schedule/feed/0Information Security Summit IV Speaker Bioshttp://www.issala.org/information-security-summit-iv-speaker-bios/
http://www.issala.org/information-security-summit-iv-speaker-bios/#respondWed, 29 Feb 2012 15:22:36 +0000http://www.issala.org/?p=1292Alan Paller, Director of Research, SANS Alan Paller is founder and research director of the SANS Institute, a graduate degree granting college and security training and research institution with more than 135,000 alumni in seventy-two countries. At SANS, he oversees the Internet Storm Center (an early warning system for the Internet), NewsBites, (the semi-weekly … Read More

]]>Alan Paller, Director of Research, SANS
Alan Paller is founder and research director of the SANS Institute, a graduate degree granting college and security training and research institution with more than 135,000 alumni in seventy-two countries. At SANS, he oversees the Internet Storm Center (an early warning system for the Internet), NewsBites, (the semi-weekly security news summary that goes to 210,000 people), and the annual publication of the “Seven Most Dangerous New Attack Vectors” being discovered each year. He leads a global security innovation program that identifies people and practices that have made a measureable difference in cyber risk reduction, and illuminates those innovations so other security practitioners can take full advantage of them to improve security in their enterprises. He is also one of the founders of the U.S. Cyber Challenge.

He has testified multiple times before both the US Senate and House of Representatives. In 2000 President Clinton recognized his leadership by naming him as one of the initial members of the President’s National Infrastructure Assurance Council. Under President Bush, the U.S. Office of Management and Budget and the Federal CIO Council named Alan as their 2005 Azimuth Award winner, a singular lifetime achievement award recognizing outstanding service of a non-government person to improving federal information technology. In May of 2010, the Washington Post named seven people as “worth knowing, or knowing about” in cyber security and included Alan on that list.

Earlier in his career Alan helped build a software company, took it public, and merged it into a larger company listed on the New York Stock Exchange. His degrees are from Cornell University and the Massachusetts Institute of Technology.

Abstract: SecurityHeroes
What are the four key controls that actually protect businesses and governments from the advanced persistent threat and most other popular cyber attack vectors? Do you know? The controls are so effective, that any security officer or consultant who does not implement them first may soon be sued for malpractice. In this fast-paced briefing, Alan will show you how you can be sure they actually work and what they are. He’ll also share with you the story of how federal IT security has been transformed over the past few months, and, in particular, how a security team transformed itself from “compliance nazis” to “security heroes using tools that are freely available. Finally he’ll show you the key technical skills that are the foundation for effectiveness as cybersecurity professionals and how California (and especially the LA area) provided the catalytic leadership that is now being followed by nearly every other state to identify and develop its young cyber talent.

Marc Maiffret, Chief Technology Officer, eEye Inc.
Marc Maiffret co-founded eEye Digital Security in 1998 and returned to the company in July 2010 as Chief Technology Officer. Marc is an industry expert in network security and has accepted three separate invitations to testify before the United States Congress on matters of national cybersecurity and critical infrastructure protection. Marc famously discovered the first Microsoft computer worm, “CodeRed” and was named one of People Magazine’s 30 People Under 30. He has been featured for cover stories in Details, the Los Angeles Times, Entrepreneur, Inc, and USA Today in addition to numerous television appearances. Prior to returning to eEye, Marc was serving as Chief Security Architect at FireEye.